Windows Security Model Borislav Varadinov Telerik Software Academy academy.telerik.com System Administrator

Slides:



Advertisements
Similar presentations
Windows Basic and Dynamic Disk Borislav Varadinov Telerik Software Academy academy.telerik.com System Administrator Marian Marinov CEO of 1H Ltd.
Advertisements

HTML Forms, GET, POST Methods Tran Anh Tuan Edit from Telerik Academy
Amazon S 3, App Engine Blobstore, Google Cloud Storage, Azure Blobs Svetlin Nakov Telerik Software Academy academy.telerik.com.
RPN and Shunting-yard algorithm Ivaylo Kenov Telerik Software Academy academy.telerik.com Technical Assistant
Shortest paths in edge-weighted digraph Krasin Georgiev Technical University of Sofia g.krasin at gmail com Assistant Professor.
Telerik Software Academy Telerik School Academy.
Asynchronous Programming with C# and WinRT
Unleash the Power of JavaScript Tooling Telerik Software Academy End-to-end JavaScript Applications.
Telerik School Academy ASP.NET MVC.
Character sequences, C-strings and the C++ String class, Working with Strings Learning & Development Team Telerik Software Academy.
Hybrid or Native?! Doncho Minkov Telerik Software Academy Senior Technical Trainer
Done already for your convenience! Telerik School Academy Unity 2D Game Development.
Processing Sequences of Elements Telerik School Academy C# Fundamentals – Part 1.
C# Fundamentals – Part I
Welcome to the JSON-stores world Telerik Software Academy Databases.
NoSQL Concepts, Redis, MongoDB, CouchDB
Telerik Software Academy Telerik School Academy Creating E/R Diagrams with SQL Server.
The Business Plan and the Business Model Margarita Antonova Volunteer Telerik Academy academy.telerik.com Business System Analyst Telerik Corporation.
What are ADTs, STL Intro, vector, list, queue, stack Learning & Development Team Telerik Software Academy.
Making JavaScript code by template! Learning & Development Team Telerik Software Academy.
Svetlin Nakov Telerik Software Academy academy.telerik.com Manager Technical Training Who, What, Why?
Svetlin Nakov Telerik Software Academy Manager Technical Training
Access to known folders, using pickers, writing to and reading from files, caching files for future access George Georgiev Telerik Software Academy academy.telerik.com.
Learning & Development Telerik Software Academy.
Reading and Writing Text Files Svetlin Nakov Telerik Software Academy academy.telerik.com Technical Trainer
Telerik Software Academy ASP.NET Web Forms.
Classical OOP in JavaScript Classes and stuff Telerik Software Academy
Optimization problems, Greedy Algorithms, Optimal Substructure and Greedy choice Learning & Development Team Telerik Software.
Using Selenium for Mobile Web Testing Powered by KendoUI Telerik QA Academy Atanas Georgiev Senior QA Engineer KendoUI Team.
NoSQL Concepts, Redis, MongoDB, CouchDB Svetlin Nakov Telerik Software Academy academy.telerik.com Manager Technical Training
New features: classes, generators, iterators, etc. Telerik Academy Plus JavaScript.Next.
File Systems - Inside FAT and NTFS Borislav Varadinov Telerik Software Academy academy.telerik.com System Administrator Marian Marinov CEO of 1H Ltd.
* ASP.NET Web Security SQL Injection, XSS, CSRF, Parameter Tampering, DoS Attacks, Session Hijacking ASP.NET MVC Telerik Software Academy
Creating E/R Diagrams with SQL Server Management Studio and MySQL Workbench Svetlin Nakov Telerik Software Academy Manager Technical.
Throwing and Catching Exceptions Tran Anh Tuan Edit from Telerik Software Academy
Telerik Software Academy ASP.NET Web Forms.
Private/Public fields, Module, Revealing Module Learning & Development Team Telerik Software Academy.
Building Data-Driven ASP.NET Web Forms Apps Telerik Software Academy ASP.NET Web Forms.
Course Introduction Svetlin Nakov Telerik Software Academy academy.telerik.com Manager Technical Training
Telerik Software Academy End-to-end JavaScript Applications.
Planning and Tracking Software Quality Yordan Dimitrov Telerik Corporation Team Leader, Team Pulse, Team Leader, Team Pulse, Telerik Corporation,
What you need to know Ivaylo Kenov Telerik Corporation Telerik Academy Student.
Data binding concepts, Bindings in WinJS George Georgiev Telerik Software Academy academy.telerik.com Technical Trainer itgeorge.net.
Pavel Kolev Telerik Software Academy Senior.Net Developer and Trainer
Objects, Properties, Primitive and Reference Types Learning & Development Team Telerik Software Academy.
When and How to Refactor? Refactoring Patterns Alexander Vakrilov Telerik Corporation Senior Developer and Team Leader.
Free Training and Job for Software Engineers Svetlin Nakov, PhD Manager Technical Training Telerik Corp. Telerik Software Academy.
Free Training and Job for Software Engineers Svetlin Nakov, PhD Manager Technical Training Telerik Corp. Telerik Software Academy.
Access to known folders, using pickers, writing to and reading from files, caching files for future access George Georgiev Telerik Software Academy academy.telerik.com.
Doing the Canvas the "easy way"! Learning & Development Telerik Software Academy.
Creating and Running Your First C# Program Svetlin Nakov Telerik Software Academy academy.telerik.com Manager Technical Training
Course Overview Doncho Minkov Telerik Software Academy Technical Trainer
Data Types, Primitive Types in C++, Variables – Declaration, Initialization, Scope Telerik Software Academy academy.telerik.com Learning and Development.
The past, the present, the future Learning & Development Team Telerik Software Academy.
Connecting, Queries, Best Practices Tran Anh Tuan Edit from Telerik Software Academy
Processing Sequences of Elements Telerik Software Academy C# Fundamentals – Part 2.
Telerik JavaScript Framework Telerik Software Academy Hybrid Mobile Applications.
Building Rock-Solid Software Nikolay Kostov Telerik Software Academy academy.telerik.com Senior Software Developer and Technical Trainer
Telerik Software Academy Databases.
Things start to get serious Telerik Software Academy JavaScript OOP.
Learning & Development Mobile apps for iPhone & iPad.
Processing Matrices and Multidimensional Tables Telerik Software Academy C# Fundamentals – Part 2.
Nikolay Kostov Telerik Software Academy academy.telerik.com Team Lead, Senior Developer and Trainer
Functions and Function Expressions Closures, Function Scope, Nested Functions Telerik Software Academy
Implementing Control Logic in C# Svetlin Nakov Telerik Software Academy academy.telerik.com Manager Technical trainer
Inheritance, Abstraction, Encapsulation, Polymorphism Telerik Software Academy Mobile apps for iPhone & iPad.
Mocking tools for easier unit testing Telerik Software Academy High Quality Code.
What why and how? Telerik School Academy Unity 2D Game Development.
Windows OS and Windows Security Model. Table of Contents Brief History of Windows OS Accounts and Security Principals Authentication and Authorization.
Presentation transcript:

Windows Security Model Borislav Varadinov Telerik Software Academy academy.telerik.com System Administrator

 Accounts and Security Principals  Authentication and Authorization  Security Account Manager  Central Directory Service (Active Directory)  Security Identifier (SID)  Access Token  Security Descriptors and Access Control Lists  Logon Process  Sharing and Network Access  User Account Control (UAC) 2

Accounts and Security Principals

 What does mean Account?  Why we need accounts?  Everyday we use various services to do our job or to enjoy.  How we protect our accounts?  Usually we use username and password 4

Authentication and Authorization 5  Authentication refers to a process that verify who you are.  Authorization refers to a process that verify what you are authorized to do. *****

Where is stored the accounts information in Windows?

 A registry hive that stores:  User accounts  Groups  Security information  Accessible only by system processes 7

 Stores accounts information in a central database  Organizes various objects into a hierarchical tree  Provides information for network resources  Enforces security polices 8 Policy

 Each computer has local SAM database  Suitable for small networks 2-10 computers 9 Workgroup SAM UserPass UserPass John123456

 Accounts are stored in a central database  More secure  More Scalable  Easy to manage 10 AD UserPass

Security Principals  Entities that the windows security system recognizes  Foundation for controlling access to securable resources  Domain and Local   Domain   User Accounts   Computer Accounts   Groups   Well-known security principals   Local   User Accounts   Groups 11

Security Identifier (SID)  Windows creates automatically a Security Identifier (SID) for each security principal  S AAA-BBB-CCC-RRR  Security Identifiers are always unique  Windows uses Security Identifier to recognize you  You can think for SID as Personal ID Number (EGN) 12

 Create  Local Users  Local Group  Manage  Local Users information  Group Membership 13

Security Access Tokens

 The system creates an access token when a user logs on  Every process executed on behalf of the user has a copy of the token  The system uses the token to control access to securable objects An access token contains the security information for a logon session

What information contains an Access Token?   User SID   Groups Membership SIDs   Privileges  System-wide permissions assigned to the logon user account  In Windows 2012, Microsoft introduced a new feature Dynamic Access Control which extends the access token with addition information 16

 How to validate your access token  In order to update the information in your access token, you have to logoff and logon again. 17

Security Descriptors (SD) and Access Control Lists (ACL) Security Descriptors (SD) and Access Control Lists (ACL)

 Security Descriptors are data structures of security information  Who is the owner of this object?  Who have access to read/write/etc?  Are the parent object rules included yes/no?  Some other information  Security Descriptors can be associated with different OS objects  File System objects  Registry objects 19

 The objects that require protection are associated with an ACL that includes:  SID of object owner  List of access control entries (ACEs)  Each ACE includes a SID and Access Mask  Access mask could include  Read, Write, Create, Delete, Modify, etc. 20  The Access Mask is different for each type of object (e.g. File, Printer, Registry etc.

 Discretionary ACL  Grants or denies access to protected resources such as files, shared memory, etc.  System ACL  Used for auditing and to enforce mandatory integrity policy (Vista and later) 21

Group/UserType ManagersR/W Company UsersRead AdministratorsFull 22 File.docx Full Read R/W Access Token Bobi Company Users Administrators Access Token Secretary Company Users Office Assistants Access Token Boss Company Users Managers Group/UserType S R/W S Read S Full Access Token S S S Access Token S S S Access Token S S S

  File System Permissions   Registry Permissions 23  Because of the object nature of Windows, ACLs can be associated with any object created by NT Object subsystem

Logon Process

25  Interactive Logon (WinLogon)  Network Logon (NetLogon)

26 LSA Service SAM Active Directory OR   The interactive logon process is the first step in user authentication and authorization.

 Issues security access tokens to accounts  Responsible for enforcing local security policy  Lsass.exe  User mode  Key component of the logon process 27

28 Workgroup SAM UserPass UserPass John123456

29 AD UserPass

Local Security Policy

  Account Policies   Password Policy   Account Lockout Policy   Local Polices   Audit Policy   Users rights assignment   Security Options   Application Control Policies   Other (Firewall/EFS/IPSec) 31

Local Security Policy (cont.) 32

Sharing and Network Access

 Network logon with Guest Account  Deny access to this computer from the network 34

 Turn on/off network discovery  Turn on/off file and print sharing  Turn on/off public folder sharing  Turn on/off password protected sharing  Remove Guest account from Deny access to this computer from the network  HomeGroups connections 35

Service Accounts

 Windows Services also runs from a context of account and also have access tokens  Local or Domain  Special Accounts   LocalSystem   LocalService   NetworkService 37

38

User Account Control (UAC)

 How it works: When your consent is required to complete a task, UAC will prompt you with a dialog box  Tasks that will trigger a UAC prompt include anything that will affect the integrity or security of the underlying system  This is a surprisingly long list of tasks  UAC works slightly differently with standard user and administrator-class accounts 40

 Prompt: Windows needs your permission to continue  Why you see this: You attempt to change a potentially dangerous system setting, such as a running a Control Panel 41

 Prompt: A program needs your permission to continue  Why you see this: An external application with a valid digital signature is attempting to run with admin privileges 42

 Prompt: An unidentified program wants access to your computer  Why you see this: in external application without a valid digital signature is trying to run 43

 Administrator accounts now logon with a mixed token  Half of this mixed token is a standard user token: this is what is typically used to determine your memberships and privileges  The other half, the administrator token, is invoked only when required: you can do so manually (run as) or automatically (certain tasks in OS are tagged as requiring an admin token) 44

форум програмиране, форум уеб дизайн курсове и уроци по програмиране, уеб дизайн – безплатно програмиране за деца – безплатни курсове и уроци безплатен SEO курс - оптимизация за търсачки уроци по уеб дизайн, HTML, CSS, JavaScript, Photoshop уроци по програмиране и уеб дизайн за ученици ASP.NET MVC курс – HTML, SQL, C#,.NET, ASP.NET MVC безплатен курс "Разработка на софтуер в cloud среда" BG Coder - онлайн състезателна система - online judge курсове и уроци по програмиране, книги – безплатно от Наков безплатен курс "Качествен програмен код" алго академия – състезателно програмиране, състезания ASP.NET курс - уеб програмиране, бази данни, C#,.NET, ASP.NET курсове и уроци по програмиране – Телерик академия курс мобилни приложения с iPhone, Android, WP7, PhoneGap free C# book, безплатна книга C#, книга Java, книга C# Николай Костов - блог за програмиране

 "Web Design with HTML 5, CSS 3 and JavaScript" Telerik Academy  html5course.telerik.com html5course.telerik.com  Telerik Software Academy  academy.telerik.com academy.telerik.com  Telerik Facebook  facebook.com/TelerikAcademy facebook.com/TelerikAcademy  Telerik Software Academy Forums  forums.academy.telerik.com forums.academy.telerik.com